Install & Run XP Pro SP3

Posted by Lumpy20 
Install & Run XP Pro SP3
Date: May 15, 2012 02:51PM
Posted by: Lumpy20
Hi all.

Its been a while but reinstalled GP4 basic and run. Inital Simergy logo, half black screen, full black screen then drops out, screen backgroung blue with displaced icons.

Installed Patch 9.6 and unlocked GP4.exe file, then ran through gpxpatch 3.93, still same result.

Setup: XP Pro SP3, GA-EP35-DS35, Dual Core Intel, 4Gb Ram, 2 x 500Gb Sata HDD, 4 x 19" HDMI - XVGA displays, dual video cards [which I suspect might be the issue].

Also have BitDefender installed and did notice 'virus notices' - so allowed GP4.exe and gpxpatch 3.93 but no difference, still initiates then black screen and drop-out.

Did a dump through gpxpatch393.exe, see below.

Any help would be appreciated.

Regards. KH

_________________
Starting log
GPxPatch version: 3.93
GPx version detected: decrypted GP4 v1.02
Verbosity level is 0
OS version info: Windows XP Service Pack 3 build 2600
Total physical memory: 2047 MB (free: 2047 MB)
Debugging gp4.exe
Waiting for debug events...
Injecting DLL loading code...
Injection succesful
First chance exception
Exception address: 0x0054cf4f
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to write to virtual address 0x00b4a000
First chance exception
Exception address: 0x7c9100e8
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
First chance exception
Exception address: 0x7c9100e8
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
First chance exception
Exception address: 0x7c9100e8
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
First chance exception
Exception address: 0x7c9100e8
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
First chance exception
Exception address: 0x7c9100e8
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
First chance exception
Exception address: 0x7c9100e8
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
First chance exception
Exception address: 0x7c9100e8
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
First chance exception
Exception address: 0x7c9100e8
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
First chance exception
Exception address: 0x7c9100e8
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
First chance exception
Exception address: 0x00509fbd
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070083
First chance exception
Exception address: 0x7c9100e8
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Unhandled exception
Exception address: 0x00509fbd
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070083
Stack trace:
00509FBD: Program Files\Infogrames\Grand Prix 4\GPxPatch.exe! <no symbol>
76B5ADFE: <no module><no symbol>
76B5AF02: <no module><no symbol>
7C80B729: WINDOWS\system32\KERNEL32.dll! GetModuleFileNameA + 442 bytes
Registers:
EAX=58070083 ECX=58070083 ESI=00000010
EBX=00000000 EDX=76B60200 EDI=0050A190
CS:EIP=001B:00509FBD
SS:ESP=0023:0182FE90 EBP=0182FEDC
DS=0023 ES=0023 FS=003B GS=0000
Flags=00000202
Stack dump:
0182fe90: 0054e75d 0050a190 00000010 0182fedc '].T...P.........'
0182fea0: 0182feb4 00000000 76b60200 0182fee8 '...........v....'
0182feb0: 00000000 0050a195 76b454e3 00000010 '......P..T.v....'
0182fec0: 00000000 00070408 00000000 00000000 '................'
0182fed0: 00000000 76b61760 76b60200 0182ff18 '....`..v...v....'
0182fee0: 76b5adfe 0050a190 00000003 00000010 '...v..P.........'
0182fef0: 00000000 00070408 00000000 00000000 '................'
0182ff00: 62415400 00000001 00000000 76b5aee9 '.TAb...........v'
0182ff10: 0050a190 00070408 0182ffb4 76b5af02 '..P............v'
0182ff20: 00000010 00000000 00000000 00000010 '................'
0182ff30: 00000021 b109dc30 806442de 891cf9a0 '!...0....Bd.....'
0182ff40: 891324d0 7ffdb000 b109dc88 80502fa0 '.$.........../P.'
0182ff50: 00780010 00000008 00000000 00000000 '..x.............'
0182ff60: 00000000 804ff8e0 00000001 00000104 '......O.........'
0182ff70: 0000010c 000001ac 891324d0 b109dd50 '.........$..P...'
0182ff80: 00000000 891325b8 b109dc01 00000000 '.....%..........'
0182ff90: 891cf9a0 80502f80 00000000 00000000 '...../P.........'
0182ffa0: 00000000 80502f88 b109dca0 806e7ef2 '...../P......~n.'
0182ffb0: 00000002 0182ffec 7c80b729 00000000 '........)..|....'
0182ffc0: 62415400 00000000 00000000 7ffdb000 '.TAb............'
0182ffd0: c0000005 0182ffc0 0182fab4 ffffffff '................'
0182ffe0: 7c839ad8 7c80b730 00000000 00000000 '...|0..|........'
0182fff0: 00000000 76b5aeaf 00000000 00000000 '.......v........'
01830000: 000000c8 00000193 eeffeeff 50001062 '............b..P'
01830010: 40000060 0000fe00 00100000 00002000 '`..@......... ..'
01830020: 00000200 00002000 0001fc2d 7ffdefff '..... ..-.......'
01830030: 0608000f 00000000 00000000 00000000 '................'
01830040: 00000000 01830588 00000017 fffffff8 '................'
01830050: 01830050 01830050 01830640 00000000 'P...P...@.......'
01830060: 00000000 00000000 00000000 00000000 '................'
01830070: 00000000 00000000 00000000 00000000 '................'
01830080: 00000000 00000000 00000000 00000000 '................'
01830090: 00000000 00000000 00000000 00000000 '................'
018300a0: 00000000 00000000 00000000 00000000 '................'
018300b0: 00000000 00000000 00000000 00000000 '................'
018300c0: 00000000 00000000 00000000 00000000 '................'
018300d0: 00000000 00000000 00000000 00000000 '................'
018300e0: 00000000 00000000 00000000 00000000 '................'
018300f0: 00000000 00000000 00000000 00000000 '................'
01830100: 00000000 00000000 00000000 00000000 '................'
01830110: 00000000 00000000 00000000 00000000 '................'
01830120: 00000000 00000000 00000000 00000000 '................'
01830130: 00000000 00000000 00000000 00000000 '................'
01830140: 00000000 00000000 00000000 00000000 '................'
01830150: 00000000 00000000 00000000 00002000 '............. ..'
01830160: 00000000 00000000 00000000 00000002 '................'
01830170: 00000000 00000000 018af688 01830688 '................'
01830180: 01830180 01830180 01830188 01830188 '................'
01830190: 01830190 01830190 01830198 01830198 '................'
018301a0: 018301a0 018301a0 018301a8 018301a8 '................'
018301b0: 018301b0 018301b0 018301b8 018301b8 '................'
018301c0: 018301c0 018301c0 018301c8 018301c8 '................'
018301d0: 018301d0 018301d0 018301d8 018301d8 '................'
018301e0: 018301e0 018301e0 018301e8 018301e8 '................'
018301f0: 018301f0 018301f0 018301f8 018301f8 '................'
01830200: 01830200 01830200 01830208 01830208 '................'
01830210: 01830210 01830210 01830218 01830218 '................'
01830220: 01830220 01830220 01830228 01830228 ' ... ...(...(...'
01830230: 01830230 01830230 01830238 01830238 '0...0...8...8...'
01830240: 01830240 01830240 01830248 01830248 '@...@...H...H...'
01830250: 01830250 01830250 01830258 01830258 'P...P...X...X...'
01830260: 01830260 01830260 01830268 01830268 '`...`...h...h...'
01830270: 01830270 01830270 01830278 01830278 'p...p...x...x...'
01830280: 01830280 01830280 01830288 01830288 '................'
Re: Install & Run XP Pro SP3
Date: May 15, 2012 11:06PM
Posted by: mortal
The log is too short, set verbosity to high.


[www.mediafire.com] Some say you should click it, you know you want to. :-) [www.gp4central.com] <----GP4 Central
Re: Install & Run XP Pro SP3
Date: May 21, 2012 10:19AM
Posted by: Lumpy20
Hi Moderator.

thanks for your help.

Updates XP Pro SP3 (it was SP3) with alll addons?

Also note I have two difference video cards, a GTS-250 and a GTS-210.

Verbose log file below, with thanks.

Regards, KH

_____________
Starting log
GPxPatch version: 3.93
GPx version detected: decrypted GP4 v1.02
Verbosity level is 2
OS version info: Windows XP Service Pack 3 build 2600
Total physical memory: 2047 MB (free: 2047 MB)
Debugging gp4.exe
Process created:
Process ID = 0x00001104
Process handle = 0x000000e4
Main thread ID = 0x000007ac
Main thread handle = 0x000000f0
Waiting for debug events...
Debug event: CREATE_PROCESS_DEBUG_EVENT
Thread ID = 0x000007ac
Entry point = 0x005ddec6
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path ntdll.dll
base 0x7c900000
size 718336
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\KERNEL32.dll
base 0x7c800000
size 989696
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\Program Files\Bitdefender\Bitdefender 2012\Active Virus Control\Avc3_00139_004\avcuf32.dll
base 0x62000000
size 466248
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\d3d8.dll
base 0x6d9a0000
size 1179648
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\d3d8thk.dll
base 0x6d990000
size 8192
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\GDI32.dll
base 0x77f10000
size 286720
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\USER32.dll
base 0x7e410000
size 578560
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\msvcrt.dll
base 0x77c10000
size 343040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\ADVAPI32.dll
base 0x77dd0000
size 617472
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\RPCRT4.dll
base 0x77e70000
size 590848
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\Secur32.dll
base 0x77fe0000
size 56832
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\VERSION.dll
base 0x77c00000
size 18944
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\dinput8.dll
base 0x6ce10000
size 181760
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\winspool.drv
base 0x73000000
size 146432
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\ole32.dll
base 0x774e0000
size 1288704
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\winmm.dll
base 0x76b40000
size 176128
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\dsound.dll
base 0x73f10000
size 367616
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\Program Files\Infogrames\Grand Prix 4\binkw32.dll
base 0x30000000
size 357939
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\wsock32.dll
base 0x71ad0000
size 22528
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\WS2_32.dll
base 0x71ab0000
size 82432
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\WS2HELP.dll
base 0x71aa0000
size 19968
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c90120e
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Setting breakpoint on entry point (0x005ddec6)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\IMM32.DLL
base 0x76390000
size 110080
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x005ddec6
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Removing breakpoint on entry point
Injecting DLL loading code...
Copying code to target at address 0x010a0000...
Injection succesful
Setting instruction pointer to injected code (0x010a0000)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\Program Files\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxpatch.gxm
base 0x09a00000
size 23552
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\Program Files\Infogrames\Grand Prix 4\GPxPSup.dll
base 0x09900000
size 31744
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\imagehlp.dll
base 0x76c90000
size 148480
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x76c90000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\imagehlp.dll
base 0x76c90000
size 148480
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x76c90000
>> D3D Constructor!
>> Starting WinMain
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\uxtheme.dll
base 0x5ad70000
size 218624
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\MSCTF.dll
base 0x74720000
size 297984
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\DOCUME~1\KEITHH~1\LOCALS~1\Temp\ammemb.dll
base 0x01d00000
size 488776
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\oleaut32.dll
base 0x77120000
size 551936
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\comctl32.dll
base 0x5d090000
size 617472
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\shlwapi.dll
base 0x77f60000
size 474112
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\shell32.dll
base 0x7c9c0000
size 8462336
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.6028_x-ww_61e65202\comctl32.dll
base 0x773d0000
size 1054208
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001674
Thread handle = 0x0000017c
Start address = 0x7c8106f9
Thread local base = 0x7ffdd000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\msctfime.ime
base 0x755c0000
size 177152
>> WM_ACTIVATE (active)(not minimized)
>> Game thread into win95_startup(0)
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x0000167c
Thread handle = 0x00000184
Start address = 0x7c8106f9
Thread local base = 0x7ffdc000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\CLBCATQ.DLL
base 0x76fd0000
size 498688
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\COMRes.dll
base 0x77050000
size 792064
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\dplayx.dll
base 0x6c750000
size 229888
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000013a0
Thread handle = 0x00000194
Start address = 0x7c8106f9
Thread local base = 0x7ffda000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\dpmodemx.dll
base 0x6c740000
size 23552
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\TAPI32.dll
base 0x76eb0000
size 181760
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\rtutils.dll
base 0x76e80000
size 44032
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x6c740000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x76eb0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x76e80000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\dpmodemx.dll
base 0x6c740000
size 23552
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\TAPI32.dll
base 0x76eb0000
size 181760
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\rtutils.dll
base 0x76e80000
size 44032
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000013a8
Thread handle = 0x000001b0
Start address = 0x7c8106f9
Thread local base = 0x7ffd9000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000013a8
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x6c740000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x76eb0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x76e80000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\dpwsockx.dll
base 0x669a0000
size 57344
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x669a0000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\dpwsockx.dll
base 0x669a0000
size 57344
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\mswsock.dll
base 0x71a50000
size 245248
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\hnetcfg.dll
base 0x662b0000
size 344064
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\System32\wshtcpip.dll
base 0x71a90000
size 19456
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\dpnhupnp.dll
base 0x6c6d0000
size 60928
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\rsaenh.dll
base 0x68000000
size 208384
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\iphlpapi.dll
base 0x76d60000
size 94720
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\rasapi32.dll
base 0x76ee0000
size 237056
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\rasman.dll
base 0x76e90000
size 61440
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\NETAPI32.dll
base 0x5b860000
size 337408
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\TAPI32.dll
base 0x76eb0000
size 181760
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\rtutils.dll
base 0x76e80000
size 44032
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\dpnhpast.dll
base 0x6c6f0000
size 35328
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x6c6f0000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000015c4
Thread handle = 0x000001e8
Start address = 0x7c8106f9
Thread local base = 0x7ffd9000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x76d60000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x6c6d0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x71a90000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000015c4
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x662b0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x669a0000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000013a0
Thread exit code = 0
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\DNSAPI.dll
base 0x76f20000
size 149504
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\iphlpapi.dll
base 0x76d60000
size 94720
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\System32\winrnr.dll
base 0x76fb0000
size 16896
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\WLDAP32.dll
base 0x76f60000
size 172032
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\rasadhlp.dll
base 0x76fc0000
size 7680
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x76fb0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x76f60000
>> MMX Enabled
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\mscat32.dll
base 0x732f0000
size 7168
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\WINTRUST.dll
base 0x76c30000
size 177664
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\CRYPT32.dll
base 0x77a80000
size 599040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\MSASN1.dll
base 0x77b20000
size 58880
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\IMAGEHLP.dll
base 0x76c90000
size 148480
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000db0
Thread handle = 0x0000020c
Start address = 0x7c8106f9
Thread local base = 0x7ffda000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000860
Thread handle = 0x00000210
Start address = 0x7c8106f9
Thread local base = 0x7ffd9000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001268
Thread handle = 0x00000214
Start address = 0x7c8106f9
Thread local base = 0x7ffd8000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000002d0
Thread handle = 0x00000218
Start address = 0x7c8106f9
Thread local base = 0x7ffd7000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path
base 0x01e80000
size 2897920
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\userenv.dll
base 0x769c0000
size 727040
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000358
Thread handle = 0x00000224
Start address = 0x7c8106f9
Thread local base = 0x7ffd6000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\cryptnet.dll
base 0x75e60000
size 64512
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\PSAPI.DLL
base 0x76bf0000
size 23040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\SensApi.dll
base 0x722b0000
size 7168
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\WINHTTP.dll
base 0x4d4f0000
size 354816
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\WLDAP32.dll
base 0x76f60000
size 172032
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x732f0000
>> nv4_disp.dll>>
>> NVIDIA GeForce 210 >>
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\mscat32.dll
base 0x732f0000
size 7168
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x732f0000
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\mscat32.dll
base 0x732f0000
size 7168
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x732f0000
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 720 x 480 (format 23) confirmed
>> Device mode 720 x 576 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 720 (format 23) confirmed
>> Device mode 1280 x 768 (format 23) confirmed
>> Device mode 1280 x 800 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 720 x 480 (format 22) confirmed
>> Device mode 720 x 576 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 720 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1280 x 800 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 720 x 480 (format 23) confirmed
>> Device mode 720 x 576 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 720 (format 23) confirmed
>> Device mode 1280 x 768 (format 23) confirmed
>> Device mode 1280 x 800 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 720 x 480 (format 22) confirmed
>> Device mode 720 x 576 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 720 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1280 x 800 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 720 x 480 (format 23) confirmed
>> Device mode 720 x 576 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 720 (format 23) confirmed
>> Device mode 1280 x 768 (format 23) confirmed
>> Device mode 1280 x 800 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 720 x 480 (format 22) confirmed
>> Device mode 720 x 576 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 720 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1280 x 800 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 720 x 480 (format 23) confirmed
>> Device mode 720 x 576 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 720 (format 23) confirmed
>> Device mode 1280 x 768 (format 23) confirmed
>> Device mode 1280 x 800 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 720 x 480 (format 22) confirmed
>> Device mode 720 x 576 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 720 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1280 x 800 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\mscat32.dll
base 0x732f0000
size 7168
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x732f0000
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\mscat32.dll
base 0x732f0000
size 7168
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x732f0000
>> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >>

>> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >>

>> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >>
Win95_Startup : 1024 x 768
>>
win95_initialiseD3D : 1024 x 768
>> Initialize3DEnvironment(1024 x 768 TNL:1)
>> Initialize3DEnvironment() - Requested width x height x format found in mode list
>> >> >> eForce 210 NVIDIA GeForce 210 >>
>>
GP_win95 :: Running gfx at 32/24 bit
>> win95_startup() - Initialize3DEnvironment ok Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x0054cf4f
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to write to virtual address 0x00b4a000
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c9100e8
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c9100e8
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c9100e8
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c9100e8
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c9100e8
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c9100e8
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c9100e8
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c9100e8
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c9100e8
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c9100e8
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x0000167c
First chance exception
Exception address: 0x00509fbd
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070083
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c9100e8
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c9100e8
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x0000167c
Unhandled exception
Exception address: 0x00509fbd
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070083
Stack trace:
00509FBD: Program Files\Infogrames\Grand Prix 4\GPxPatch.exe! <no symbol>
76B5ADFE: <no module><no symbol>
76B5AF02: <no module><no symbol>
7C80B729: WINDOWS\system32\kernel32.dll! GetModuleFileNameA + 442 bytes
Registers:
EAX=58070083 ECX=58070083 ESI=00000010
EBX=00000000 EDX=76B60200 EDI=0050A190
CS:EIP=001B:00509FBD
SS:ESP=0023:0182FE90 EBP=0182FEDC
DS=0023 ES=0023 FS=003B GS=0000
Flags=00000202
Stack dump:
0182fe90: 0054e75d 0050a190 00000010 0182fedc '].T...P.........'
0182fea0: 0182feb4 00000000 76b60200 0182fee8 '...........v....'
0182feb0: 00000000 0050a195 76b454e3 00000010 '......P..T.v....'
0182fec0: 00000000 000405c6 00000000 00000000 '................'
0182fed0: 00000000 76b61760 76b60200 0182ff18 '....`..v...v....'
0182fee0: 76b5adfe 0050a190 00000003 00000010 '...v..P.........'
0182fef0: 00000000 000405c6 00000000 00000000 '................'
0182ff00: 62415400 00000001 00000000 76b5aee9 '.TAb...........v'
0182ff10: 0050a190 000405c6 0182ffb4 76b5af02 '..P............v'
0182ff20: 00000010 00000000 00000000 00000010 '................'
0182ff30: 00000021 b16eec30 806442de 891b0550 '!...0.n..Bd.P...'
0182ff40: 8895c810 7ffdc000 b16eec88 80502fa0 '..........n../P.'
0182ff50: 00780010 00000008 00000000 00000000 '..x.............'
0182ff60: 00000000 804ff8e0 00000001 00000104 '......O.........'
0182ff70: 0000010c 000001ac 8895c810 b16eed50 '............P.n.'
0182ff80: 00000000 8895c8f8 706f6301 00000000 '.........cop....'
0182ff90: 891b0550 80502f80 00000000 00000000 'P..../P.........'
0182ffa0: 00000000 80502f88 b16eeca0 806e7ef2 '...../P...n..~n.'
0182ffb0: 00000002 0182ffec 7c80b729 00000000 '........)..|....'
0182ffc0: 62415400 00000000 00000000 7ffdc000 '.TAb............'
0182ffd0: c0000005 0182ffc0 0182fab4 ffffffff '................'
0182ffe0: 7c839ad8 7c80b730 00000000 00000000 '...|0..|........'
0182fff0: 00000000 76b5aeaf 00000000 00000000 '.......v........'
01830000: 000000c8 0000012a eeffeeff 50001062 '....*.......b..P'
01830010: 40000060 0000fe00 00100000 00002000 '`..@......... ..'
01830020: 00000200 00002000 0001fc2d 7ffdefff '..... ..-.......'
01830030: 0608000f 00000000 00000000 00000000 '................'
01830040: 00000000 01830588 00000017 fffffff8 '................'
01830050: 01830050 01830050 01830640 00000000 'P...P...@.......'
01830060: 00000000 00000000 00000000 00000000 '................'
01830070: 00000000 00000000 00000000 00000000 '................'
01830080: 00000000 00000000 00000000 00000000 '................'
01830090: 00000000 00000000 00000000 00000000 '................'
018300a0: 00000000 00000000 00000000 00000000 '................'
018300b0: 00000000 00000000 00000000 00000000 '................'
018300c0: 00000000 00000000 00000000 00000000 '................'
018300d0: 00000000 00000000 00000000 00000000 '................'
018300e0: 00000000 00000000 00000000 00000000 '................'
018300f0: 00000000 00000000 00000000 00000000 '................'
01830100: 00000000 00000000 00000000 00000000 '................'
01830110: 00000000 00000000 00000000 00000000 '................'
01830120: 00000000 00000000 00000000 00000000 '................'
01830130: 00000000 00000000 00000000 00000000 '................'
01830140: 00000000 00000000 00000000 00000000 '................'
01830150: 00000000 00000000 00000000 00002000 '............. ..'
01830160: 00000000 00000000 00000000 00000002 '................'
01830170: 00000000 00000000 018af688 01830688 '................'
01830180: 01830180 01830180 01830188 01830188 '................'
01830190: 01830190 01830190 01830198 01830198 '................'
018301a0: 018301a0 018301a0 018301a8 018301a8 '................'
018301b0: 018301b0 018301b0 018301b8 018301b8 '................'
018301c0: 018301c0 018301c0 018301c8 018301c8 '................'
018301d0: 018301d0 018301d0 018301d8 018301d8 '................'
018301e0: 018301e0 018301e0 018301e8 018301e8 '................'
018301f0: 018301f0 018301f0 018301f8 018301f8 '................'
01830200: 01830200 01830200 01830208 01830208 '................'
01830210: 01830210 01830210 01830218 01830218 '................'
01830220: 01830220 01830220 01830228 01830228 ' ... ...(...(...'
01830230: 01830230 01830230 01830238 01830238 '0...0...8...8...'
01830240: 01830240 01830240 01830248 01830248 '@...@...H...H...'
01830250: 01830250 01830250 01830258 01830258 'P...P...X...X...'
01830260: 01830260 01830260 01830268 01830268 '`...`...h...h...'
01830270: 01830270 01830270 01830278 01830278 'p...p...x...x...'
01830280: 01830280 01830280 01830288 01830288 '................'
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000007ac
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x0000167c
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000db0
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001268
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000358
Thread exit code = -1073741819
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001030
Thread handle = 0x00000224
Start address = 0x7c8106f9
Thread local base = 0x7ffde000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001674
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000860
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000002d0
Thread exit code = -1073741819
Debug event: EXIT_PROCESS_DEBUG_EVENT
Thread ID = 0x00001030
Process exit code = -1073741819
Re: Install & Run XP Pro SP3
Date: May 21, 2012 10:25AM
Posted by: Lumpy20
Hi Moderator,

Full log below

Note I have two video cards, a GTS250 and a GTS210.

XP Pro SP3 updated with all mods loaded.

Thanks for your help.

Regards,

Keith

____________

Starting log
GPxPatch version: 3.93
GPx version detected: decrypted GP4 v1.02
Verbosity level is 2
OS version info: Windows XP Service Pack 3 build 2600
Total physical memory: 2047 MB (free: 2047 MB)
Debugging gp4.exe
Process created:
Process ID = 0x00001104
Process handle = 0x000000e4
Main thread ID = 0x000007ac
Main thread handle = 0x000000f0
Waiting for debug events...
Debug event: CREATE_PROCESS_DEBUG_EVENT
Thread ID = 0x000007ac
Entry point = 0x005ddec6
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path ntdll.dll
base 0x7c900000
size 718336
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\KERNEL32.dll
base 0x7c800000
size 989696
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\Program Files\Bitdefender\Bitdefender 2012\Active Virus Control\Avc3_00139_004\avcuf32.dll
base 0x62000000
size 466248
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\d3d8.dll
base 0x6d9a0000
size 1179648
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\d3d8thk.dll
base 0x6d990000
size 8192
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\GDI32.dll
base 0x77f10000
size 286720
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\USER32.dll
base 0x7e410000
size 578560
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\msvcrt.dll
base 0x77c10000
size 343040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\ADVAPI32.dll
base 0x77dd0000
size 617472
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\RPCRT4.dll
base 0x77e70000
size 590848
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\Secur32.dll
base 0x77fe0000
size 56832
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\VERSION.dll
base 0x77c00000
size 18944
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\dinput8.dll
base 0x6ce10000
size 181760
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\winspool.drv
base 0x73000000
size 146432
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\ole32.dll
base 0x774e0000
size 1288704
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\winmm.dll
base 0x76b40000
size 176128
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\dsound.dll
base 0x73f10000
size 367616
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\Program Files\Infogrames\Grand Prix 4\binkw32.dll
base 0x30000000
size 357939
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\wsock32.dll
base 0x71ad0000
size 22528
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\WS2_32.dll
base 0x71ab0000
size 82432
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\WS2HELP.dll
base 0x71aa0000
size 19968
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c90120e
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Setting breakpoint on entry point (0x005ddec6)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\IMM32.DLL
base 0x76390000
size 110080
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x005ddec6
Exception flags: 0x00000000
Exception code: EXCEPTION_BREAKPOINT
Removing breakpoint on entry point
Injecting DLL loading code...
Copying code to target at address 0x010a0000...
Injection succesful
Setting instruction pointer to injected code (0x010a0000)
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\Program Files\Infogrames\Grand Prix 4\gpxpdata\gxm\gpxpatch.gxm
base 0x09a00000
size 23552
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\Program Files\Infogrames\Grand Prix 4\GPxPSup.dll
base 0x09900000
size 31744
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\imagehlp.dll
base 0x76c90000
size 148480
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x76c90000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\imagehlp.dll
base 0x76c90000
size 148480
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x76c90000
>> D3D Constructor!
>> Starting WinMain
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\uxtheme.dll
base 0x5ad70000
size 218624
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\MSCTF.dll
base 0x74720000
size 297984
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\DOCUME~1\KEITHH~1\LOCALS~1\Temp\ammemb.dll
base 0x01d00000
size 488776
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\oleaut32.dll
base 0x77120000
size 551936
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\comctl32.dll
base 0x5d090000
size 617472
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\shlwapi.dll
base 0x77f60000
size 474112
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\shell32.dll
base 0x7c9c0000
size 8462336
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.6028_x-ww_61e65202\comctl32.dll
base 0x773d0000
size 1054208
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001674
Thread handle = 0x0000017c
Start address = 0x7c8106f9
Thread local base = 0x7ffdd000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\msctfime.ime
base 0x755c0000
size 177152
>> WM_ACTIVATE (active)(not minimized)
>> Game thread into win95_startup(0)
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x0000167c
Thread handle = 0x00000184
Start address = 0x7c8106f9
Thread local base = 0x7ffdc000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\CLBCATQ.DLL
base 0x76fd0000
size 498688
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\COMRes.dll
base 0x77050000
size 792064
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\dplayx.dll
base 0x6c750000
size 229888
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000013a0
Thread handle = 0x00000194
Start address = 0x7c8106f9
Thread local base = 0x7ffda000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\dpmodemx.dll
base 0x6c740000
size 23552
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\TAPI32.dll
base 0x76eb0000
size 181760
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\rtutils.dll
base 0x76e80000
size 44032
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x6c740000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x76eb0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x76e80000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\dpmodemx.dll
base 0x6c740000
size 23552
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\TAPI32.dll
base 0x76eb0000
size 181760
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\rtutils.dll
base 0x76e80000
size 44032
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000013a8
Thread handle = 0x000001b0
Start address = 0x7c8106f9
Thread local base = 0x7ffd9000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000013a8
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x6c740000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x76eb0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x76e80000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\dpwsockx.dll
base 0x669a0000
size 57344
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x669a0000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\dpwsockx.dll
base 0x669a0000
size 57344
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\mswsock.dll
base 0x71a50000
size 245248
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\hnetcfg.dll
base 0x662b0000
size 344064
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\System32\wshtcpip.dll
base 0x71a90000
size 19456
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\dpnhupnp.dll
base 0x6c6d0000
size 60928
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\rsaenh.dll
base 0x68000000
size 208384
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\iphlpapi.dll
base 0x76d60000
size 94720
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\rasapi32.dll
base 0x76ee0000
size 237056
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\rasman.dll
base 0x76e90000
size 61440
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\NETAPI32.dll
base 0x5b860000
size 337408
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\TAPI32.dll
base 0x76eb0000
size 181760
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\rtutils.dll
base 0x76e80000
size 44032
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\dpnhpast.dll
base 0x6c6f0000
size 35328
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x6c6f0000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000015c4
Thread handle = 0x000001e8
Start address = 0x7c8106f9
Thread local base = 0x7ffd9000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x76d60000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x6c6d0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x71a90000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000015c4
Thread exit code = 0
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x662b0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x669a0000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000013a0
Thread exit code = 0
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\DNSAPI.dll
base 0x76f20000
size 149504
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\iphlpapi.dll
base 0x76d60000
size 94720
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\System32\winrnr.dll
base 0x76fb0000
size 16896
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\WLDAP32.dll
base 0x76f60000
size 172032
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\rasadhlp.dll
base 0x76fc0000
size 7680
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x76fb0000
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x76f60000
>> MMX Enabled
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\mscat32.dll
base 0x732f0000
size 7168
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\WINTRUST.dll
base 0x76c30000
size 177664
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\CRYPT32.dll
base 0x77a80000
size 599040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\MSASN1.dll
base 0x77b20000
size 58880
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\IMAGEHLP.dll
base 0x76c90000
size 148480
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000db0
Thread handle = 0x0000020c
Start address = 0x7c8106f9
Thread local base = 0x7ffda000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000860
Thread handle = 0x00000210
Start address = 0x7c8106f9
Thread local base = 0x7ffd9000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001268
Thread handle = 0x00000214
Start address = 0x7c8106f9
Thread local base = 0x7ffd8000
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x000002d0
Thread handle = 0x00000218
Start address = 0x7c8106f9
Thread local base = 0x7ffd7000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path
base 0x01e80000
size 2897920
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\userenv.dll
base 0x769c0000
size 727040
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00000358
Thread handle = 0x00000224
Start address = 0x7c8106f9
Thread local base = 0x7ffd6000
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\cryptnet.dll
base 0x75e60000
size 64512
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\PSAPI.DLL
base 0x76bf0000
size 23040
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\SensApi.dll
base 0x722b0000
size 7168
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\WINHTTP.dll
base 0x4d4f0000
size 354816
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\WLDAP32.dll
base 0x76f60000
size 172032
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x732f0000
>> nv4_disp.dll>>
>> NVIDIA GeForce 210 >>
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\mscat32.dll
base 0x732f0000
size 7168
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x732f0000
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\mscat32.dll
base 0x732f0000
size 7168
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x732f0000
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 720 x 480 (format 23) confirmed
>> Device mode 720 x 576 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 720 (format 23) confirmed
>> Device mode 1280 x 768 (format 23) confirmed
>> Device mode 1280 x 800 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 720 x 480 (format 22) confirmed
>> Device mode 720 x 576 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 720 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1280 x 800 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 720 x 480 (format 23) confirmed
>> Device mode 720 x 576 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 720 (format 23) confirmed
>> Device mode 1280 x 768 (format 23) confirmed
>> Device mode 1280 x 800 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 720 x 480 (format 22) confirmed
>> Device mode 720 x 576 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 720 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1280 x 800 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 720 x 480 (format 23) confirmed
>> Device mode 720 x 576 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 720 (format 23) confirmed
>> Device mode 1280 x 768 (format 23) confirmed
>> Device mode 1280 x 800 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 720 x 480 (format 22) confirmed
>> Device mode 720 x 576 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 720 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1280 x 800 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 720 x 480 (format 23) confirmed
>> Device mode 720 x 576 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 720 (format 23) confirmed
>> Device mode 1280 x 768 (format 23) confirmed
>> Device mode 1280 x 800 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 720 x 480 (format 22) confirmed
>> Device mode 720 x 576 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 720 (format 22) confirmed
>> Device mode 1280 x 768 (format 22) confirmed
>> Device mode 1280 x 800 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\mscat32.dll
base 0x732f0000
size 7168
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x732f0000
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
>> Device mode 640 x 480 (format 23) confirmed
>> Device mode 800 x 600 (format 23) confirmed
>> Device mode 1024 x 768 (format 23) confirmed
>> Device mode 1152 x 864 (format 23) confirmed
>> Device mode 1280 x 960 (format 23) confirmed
>> Device mode 1280 x 1024 (format 23) confirmed
>> Device mode 640 x 480 (format 22) confirmed
>> Device mode 800 x 600 (format 22) confirmed
>> Device mode 1024 x 768 (format 22) confirmed
>> Device mode 1152 x 864 (format 22) confirmed
>> Device mode 1280 x 960 (format 22) confirmed
>> Device mode 1280 x 1024 (format 22) confirmed
Debug event: LOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
path C:\WINDOWS\system32\mscat32.dll
base 0x732f0000
size 7168
Debug event: UNLOAD_DLL_DEBUG_EVENT
Thread ID = 0x000007ac
base 0x732f0000
>> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >>

>> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >>

>> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >>
Win95_Startup : 1024 x 768
>>
win95_initialiseD3D : 1024 x 768
>> Initialize3DEnvironment(1024 x 768 TNL:1)
>> Initialize3DEnvironment() - Requested width x height x format found in mode list
>> >> >> eForce 210 NVIDIA GeForce 210 >>
>>
GP_win95 :: Running gfx at 32/24 bit
>> win95_startup() - Initialize3DEnvironment ok Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x0054cf4f
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to write to virtual address 0x00b4a000
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c9100e8
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c9100e8
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c9100e8
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c9100e8
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c9100e8
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c9100e8
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c9100e8
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c9100e8
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c9100e8
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c9100e8
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x0000167c
First chance exception
Exception address: 0x00509fbd
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070083
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c9100e8
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x000007ac
First chance exception
Exception address: 0x7c9100e8
Module name: 'ntdll.dll' (base 0x7c900000, size 718336)
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070093
Debug event: EXCEPTION_DEBUG_EVENT
Thread ID = 0x0000167c
Unhandled exception
Exception address: 0x00509fbd
Exception flags: 0x00000000
Exception code: EXCEPTION_ACCESS_VIOLATION
Process tried to read from virtual address 0x58070083
Stack trace:
00509FBD: Program Files\Infogrames\Grand Prix 4\GPxPatch.exe! <no symbol>
76B5ADFE: <no module><no symbol>
76B5AF02: <no module><no symbol>
7C80B729: WINDOWS\system32\kernel32.dll! GetModuleFileNameA + 442 bytes
Registers:
EAX=58070083 ECX=58070083 ESI=00000010
EBX=00000000 EDX=76B60200 EDI=0050A190
CS:EIP=001B:00509FBD
SS:ESP=0023:0182FE90 EBP=0182FEDC
DS=0023 ES=0023 FS=003B GS=0000
Flags=00000202
Stack dump:
0182fe90: 0054e75d 0050a190 00000010 0182fedc '].T...P.........'
0182fea0: 0182feb4 00000000 76b60200 0182fee8 '...........v....'
0182feb0: 00000000 0050a195 76b454e3 00000010 '......P..T.v....'
0182fec0: 00000000 000405c6 00000000 00000000 '................'
0182fed0: 00000000 76b61760 76b60200 0182ff18 '....`..v...v....'
0182fee0: 76b5adfe 0050a190 00000003 00000010 '...v..P.........'
0182fef0: 00000000 000405c6 00000000 00000000 '................'
0182ff00: 62415400 00000001 00000000 76b5aee9 '.TAb...........v'
0182ff10: 0050a190 000405c6 0182ffb4 76b5af02 '..P............v'
0182ff20: 00000010 00000000 00000000 00000010 '................'
0182ff30: 00000021 b16eec30 806442de 891b0550 '!...0.n..Bd.P...'
0182ff40: 8895c810 7ffdc000 b16eec88 80502fa0 '..........n../P.'
0182ff50: 00780010 00000008 00000000 00000000 '..x.............'
0182ff60: 00000000 804ff8e0 00000001 00000104 '......O.........'
0182ff70: 0000010c 000001ac 8895c810 b16eed50 '............P.n.'
0182ff80: 00000000 8895c8f8 706f6301 00000000 '.........cop....'
0182ff90: 891b0550 80502f80 00000000 00000000 'P..../P.........'
0182ffa0: 00000000 80502f88 b16eeca0 806e7ef2 '...../P...n..~n.'
0182ffb0: 00000002 0182ffec 7c80b729 00000000 '........)..|....'
0182ffc0: 62415400 00000000 00000000 7ffdc000 '.TAb............'
0182ffd0: c0000005 0182ffc0 0182fab4 ffffffff '................'
0182ffe0: 7c839ad8 7c80b730 00000000 00000000 '...|0..|........'
0182fff0: 00000000 76b5aeaf 00000000 00000000 '.......v........'
01830000: 000000c8 0000012a eeffeeff 50001062 '....*.......b..P'
01830010: 40000060 0000fe00 00100000 00002000 '`..@......... ..'
01830020: 00000200 00002000 0001fc2d 7ffdefff '..... ..-.......'
01830030: 0608000f 00000000 00000000 00000000 '................'
01830040: 00000000 01830588 00000017 fffffff8 '................'
01830050: 01830050 01830050 01830640 00000000 'P...P...@.......'
01830060: 00000000 00000000 00000000 00000000 '................'
01830070: 00000000 00000000 00000000 00000000 '................'
01830080: 00000000 00000000 00000000 00000000 '................'
01830090: 00000000 00000000 00000000 00000000 '................'
018300a0: 00000000 00000000 00000000 00000000 '................'
018300b0: 00000000 00000000 00000000 00000000 '................'
018300c0: 00000000 00000000 00000000 00000000 '................'
018300d0: 00000000 00000000 00000000 00000000 '................'
018300e0: 00000000 00000000 00000000 00000000 '................'
018300f0: 00000000 00000000 00000000 00000000 '................'
01830100: 00000000 00000000 00000000 00000000 '................'
01830110: 00000000 00000000 00000000 00000000 '................'
01830120: 00000000 00000000 00000000 00000000 '................'
01830130: 00000000 00000000 00000000 00000000 '................'
01830140: 00000000 00000000 00000000 00000000 '................'
01830150: 00000000 00000000 00000000 00002000 '............. ..'
01830160: 00000000 00000000 00000000 00000002 '................'
01830170: 00000000 00000000 018af688 01830688 '................'
01830180: 01830180 01830180 01830188 01830188 '................'
01830190: 01830190 01830190 01830198 01830198 '................'
018301a0: 018301a0 018301a0 018301a8 018301a8 '................'
018301b0: 018301b0 018301b0 018301b8 018301b8 '................'
018301c0: 018301c0 018301c0 018301c8 018301c8 '................'
018301d0: 018301d0 018301d0 018301d8 018301d8 '................'
018301e0: 018301e0 018301e0 018301e8 018301e8 '................'
018301f0: 018301f0 018301f0 018301f8 018301f8 '................'
01830200: 01830200 01830200 01830208 01830208 '................'
01830210: 01830210 01830210 01830218 01830218 '................'
01830220: 01830220 01830220 01830228 01830228 ' ... ...(...(...'
01830230: 01830230 01830230 01830238 01830238 '0...0...8...8...'
01830240: 01830240 01830240 01830248 01830248 '@...@...H...H...'
01830250: 01830250 01830250 01830258 01830258 'P...P...X...X...'
01830260: 01830260 01830260 01830268 01830268 '`...`...h...h...'
01830270: 01830270 01830270 01830278 01830278 'p...p...x...x...'
01830280: 01830280 01830280 01830288 01830288 '................'
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000007ac
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x0000167c
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000db0
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001268
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000358
Thread exit code = -1073741819
Debug event: CREATE_THREAD_DEBUG_EVENT
Thread ID = 0x00001030
Thread handle = 0x00000224
Start address = 0x7c8106f9
Thread local base = 0x7ffde000
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00001674
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x00000860
Thread exit code = -1073741819
Debug event: EXIT_THREAD_DEBUG_EVENT
Thread ID = 0x000002d0
Thread exit code = -1073741819
Debug event: EXIT_PROCESS_DEBUG_EVENT
Thread ID = 0x00001030
Process exit code = -1073741819
Re: Install & Run XP Pro SP3
Date: January 27, 2016 07:39PM
Posted by: SDI
This should be fixed with GPxPatch 4.44.

René Smit, Independent Software Developer.
Download my GPx tools here.
Sorry, only registered users may post in this forum.

Click here to login

Maintainer: mortal, stephan | Design: stephan, Lo2k | Moderatoren: mortal, TomMK, Noog, stephan | Downloads: Lo2k | Supported by: Atlassian Experts Berlin | Forum Rules | Policy